How do I backup my Bitcoin.com Wallet? | Bitcoin.com
How do I backup my Bitcoin.com Wallet? | Bitcoin.com
How to Backup Your Bitcoin Wallet - Cloudwards
How to backup core wallet and how to replace wallet.dat
Securing your wallet - Bitcoin
How to Backup your Bitcoin wallet (blockchain.info
A secure bitcoin wallet for friends and companies
Copay is a secure bitcoin wallet for friends and companies. Easy-to-use multisignature bitcoin wallet, bringing corporate-level security to ordinary people. When friends or company executives join a Copay wallet, more than one person must sign every transaction. If your computer is compromised and your private keys are stolen, the bitcoins are still safe. This is in addition to state-of-the-art encrypted storage and communication.
Bit coin is a peer to peer transaction system created last year that uses trades to be, conducted by a digital money, the bit coin. Unlike monies given by states, Bit Coin is completely electronic and is separate of any state or market, without ties to some monetary authority, corporation, or business.
PSA: Added Step May Be Needed When Restoring a Backup Encrypted wallet.dat to Bitcoin Core
TL;DR: To successfully restore an encrypted wallet.dat file, the instance of Bitcoin Core getting restored to needs to first have Encryption turned on and possibly the same Passphrase set as the wallet.dat file you are restoring. It seems this must be done before you restore your encrypted wallet.dat from backup, or Bitcoin Core will just show a zero balance. For the record, the set-up for this situation was as follows: Bitcoin Core (formerly Bitcoin-Qt) 0.9.2.1, Windows x86 version, on Windows XP Pro patched for 2019 PoS updates. Recently, my Bitcoin Core hot wallet had been acting up and crashing after about 6 to 12 hours of uptime. I thought that there was possibly some corruption in Core's database files, so I backed up my wallet.dat and started deleting block chain data/index files to see if a rescan or reindex would correct the problem. I tried to save time by not deleting everything, only certain file types. I managed to somehow screw up and got the dreaded "wallet.dat corrupt, salvage failed" message. Since I had a backup, I didn't bother trying the "-salvagewallet" command-line option (which might have actually corrected my problem.) Instead, I went straight for a restore from backup. Some time ago, and on a much older version of Bitcoin-Qt I had familiarized myself with the wallet.dat backup and restore process. I never had a problem with it. But thinking back, I may have done all of my testing with unencrypted wallet.dat files. In this case, I uninstalled Core, deleted everything in the Bitcoin data directory, reinstalled Core, used bootstrap.dat to catch up as much of the block chain as possible, and let the new install finish syncing from the Internet. Once Core was up-to-date, I closed it and restored my encrypted wallet.dat from backup. In my previous experience, I'd be done at this point. The next time I started the wallet, it would have automatically rescanned, and I'd be back in business. This time, when the wallet finally started up again, it showed no errors, the block chain was still fully synced up, but the wallet showed a zero balance. Not a good feeling. I thought maybe I'd need to manually start Core using the "-rescan" command-line option. I tried this, but got the same result. After mulling things over, I finally guessed that the problem might have something to do with Core's wallet.dat encryption. I again deleted the wallet.dat file from the Bitcoin data directory and restarted Core. Once it finished generating a new wallet.dat file, I enabled Encryption and set the same Passphrase as the wallet.dat file I was trying to restore. Core shut itself down to complete encrypting the new wallet.dat file. Next, I started Core once again to make sure all was OK with new encrypted but empty wallet.dat. I then closed Core and replaced the zero-balance wallet.dat file with my recent backup. That finally did the trick. On the next start, Core automatically did a rescan and my balance reappeared. I don't know for sure if this behavior is the same across all the different flavors of Bitcoin Core 0.9.2.1 (x64, OSX, Linux), but I suspect it might be. Also, it might work just to enable Encryption, but it might not be necessary to have the same Passphrase. I can only confirm that it worked in my case with the same Passphrase. This little adventure was unnerving, particularly since Core issues no errors and just insists there's a zero balance. I thought I should relate what I learned in case someone else encounters the same situation. Cheers, and to the moon! EDIT: At least a couple posts so far report not seeing the same behavior I did. I'm glad if it's a non-issue, and I can't explain why it happened to me. I can just suggest if you have similar issues, it might be worth it to give this method a try.
semi-quick answers to common questions of new people
so people often ask similar questions over here and because they are getting probably kinda annoying over time to many I just try to answer as many as I find. if you have more that would fit here, add them to the comments
can I recieve coins without the ledger being connected to a computer
how does that work?
basically crypto currencies work like a bank-only currency, all funds are in the Consensus network which basically works like the bank of the currency, they carry out the transactions and verify you are not trying to overspend. all transactions are basically in an accounting book which is referenced to check your currency balance (which is the blockchain)
tldr: does your debit card need to be online for your account to recieve funds? nope.
I just sent/recieved coins, why are they not showing yet?
as the cryptocurrency's bank while being central to the currency (as in no currency can ever leave the network) the bank in itself is not a central institution but anyone can be part of it, and one of the major things that need to exist because of this is Consensus, or in plain english: agreement. because of this, a few blocks need to pass so nobody can manipulate the chain by calculating a different chain that overrides a transaction with a different one (double-spending)
tldr: the network of many needs time to agree whose transactions are processed in what order and therefore need a bit of time
(which in case of bitcoin is typically an hour after the transaction has set into a block)
my transaction does not get into a block
chances might be your fees are too low, while you cannot directly fix this in Ledger live, other wallets allow you to send another transaction with the same "transaction number" (aka nonce) and higher fees which as soon as it gets placed into the chain, invalidates the old one as each number can only be used once.
my bitcoin address changes everytime I try to recieve in Ledger live, is that normal?
yes. it is a privacy mechanism of the standard of how ledger generates addresses, basically allowing you to stay a little bit more private.
you CAN use your old addresses if you really want but it is obviously less private
how does that work and how do I make sure the address is correct?
simply said: complex math. if you for example enter "my secret -> Bitcoin 1" into the sha256 algorithm you get 3f667104b9efdc247d860a35d9343ec2af6adf16ee87d44bcd4a6c2af572bab8, if you however enter "my secret -> Bitcoin 2", you get 58f5c09c46585dca9bf50b2d3beb48766254138c1f89df8111cf7e012b4d7004 which cannot easily be correlated to each other, it's the same concept but more complicated.
for verification, plug in your ledger when recieving and verify your address by using the Ledger's display.
do I need to backup my currency keys often?
nope and in fact there is nothing to backup except your seed phrase. Ledger uses a technique called deterministic wallets, which allows your secret and a standardized sequence of math operations to determine your keys addresses and everything.
the above answer literally illustrates the concept, where you would throw your secret and data about which currency and the how many-th account you need into a complex piece of math and get your data out.
TLDR: all you need are your 24 words.
can I create hidden wallets on my ledger which cannot be easily accessed?
sure. but be warned, THIS IS ADVANCED.
there is a feature called a passphrase, which you can add onto your 24 words (which is why it is sometimes called a 25th word, but it can literally be anything), which works as a way to create a new set of addresses. however unlike your 24 words, there is no checksum and as it can literally be anything it is case sensitive and everything, so be careful when noting it down.
you can either attach the passphrase temporarily (gone when you turn off your ledger) or set up a second PIN with that passphrase stored on your ledger
HELP: I lost my:
if you have your 24 word seed (and passphrase if you use it, you can just reset by entering 3 wrong PINs and recover
if not, sorry, your assets are gone, so KEEP A BACKUP OF YOUR SEED
Ledger Passphrase PIN:
if you have your passphrase, just enter your main PIN and re-attach your passphrase
if you have your ledger PIN, you can move away your coins to an exchange or a new seed (which you either initialize using a second ledger or you use a software wallet for the short term while being SUPER careful (or as a compromise, new 24 words you generate offline) and transfer your funds over there, in case you used a software wallet or an exchange, reset your ledger afterwards and create a new set of 24 words and transfer back to them.
in case you use a passphrase you either need both PINs or main pin and passphrase
in case you do not have the above, it's sad and all is gone yet again.
if you have a passphrase PIN and you know it, you can TEMPORARILY attach a new phrase to your ledger to get new addresses, switch back to the passphrase using your PIN and send the funds over to your new passphrase's addresses.
if not, be sad.
Ledger Live Password
you can just reset ledger live. ledger live is just an application to watch your currency and prepare transactions for your ledger to sign. its contents LITERALLY DONT MATTER
if you dont need the privacy added by the password you can set up ledger live without any password as well.
long story short: your ledger live password doesnt matter, your PINs dont matter too much, but SERIOUSLY, BACKUP YOUR SEED AND PASSPHRASE
I cannot recover, why cant the Ledger makers help me?
unlike in a real life bank which can verify your human identity and issue new keys, to the Consensus network, YOUR KEYS ARE YOUR IDENTITY, and your 24 words are effectively your keys. aside from your backup THERE IS NO BACKUP.
Someone claims to be from [Ledger, the Police, the network of a coin etc.] and wants my 24 words/passphrase to verify something, should I tell them.
I did say your ledger effectively is your debit card, and your 24 words and passphrase are effectively a template for making a new one with full access to your account. and unlike a debit card in real life might have, there are no spending limits aside from the fact you cannot go below zero, and there is no fraud department, or chargeback.
IF ANYONE HAS YOUR KEYS, THEY CAN EMPTY YOUR ACCOUNTS, ALL OF THEM.
Dear community, I would like to introduce you to our new hardware wallet - NGRAVE ZERO - but first I want to address the likely immediate skepticism popping up in your head - "oh no, another one, why should I even bother listening to this?", etc. You might be thinking something along these lines, and rightfully so if you do. So, I want you to know why we really built this. We chose this path because we are blockchain technology believers, yet our very own experiences have reminded us over and over again that holding crypto isn't safe or at least full of dangers. The best (and for him worst) example is our CTO losing 44,000ETH with his company SwarmCity in the 2017 Parity hack. Similar experiences brought us, the three co-founders of NGRAVE, together in 2018. There and then, we decided to build the one solution that we would fully trust with our very first till our very last bitcoin. A solution to empower you, the user, to start truly owning what is yours. Throughout our journey, we partnered up with world leading players in nanotechnology, applied cryptography, hardware security, and more. Even the second reference of Satoshi's famed bitcoin paper - the famous cryptographer Jean-Jacques Quisquater - mentioned in almost every cryptography paper - joined in on our project. The result: we built, from the ground up, a new hardware wallet - ZERO - and a new metal backup solution - GRAPHENE. We even designed a system, together with Chainlink, for the safe posthumous recovery of your keys by your family, when the time comes. We analysed the end-to-end process of you owning your crypto, starting with the generation of your private keys (or master seed), having a real time overview of your accounts, receiving and signing transactions - basically your full user journey. And we left no stone unturned when looking at your security and ease of use. Today, I'm happy to tell you that our pre-order is live on Indiegogo since one week, and that we just surpassed our 500th backer. With leaving no stone unturned, we really mean it. We for example upgraded the key generation process, so that you no longer have to worry about backdoors in the interior (TRNG) chip (not necessarily by the manufacturer but even by governments and intelligence agencies), or that the hardware manufacturer might have information on your keys. Our ZERO is completely offline, multi-layered tamper proof, and the only blockchain solution in the world with an EAL7 security certification, the highest achievable. That's how serious we take your security. I'm telling you this now as I believe this is a very good time to contemplate how serious you are about your security and ease of use when managing your crypto. Especially since several of us are already smelling the next bull run. Also especially since you can get the ZERO and GRAPHENE at a considerable discount, right now. And especially since your security is not open for discussion. And know, if our intention was purely to sell and get rich, we would have chosen an easier entrepreneurial path, but we didn't. We chose the extremely challenging mix of hardware, high security, crypto (a difficult environment to sell given the unfortunate high amount of scams, as well as we started this journey when crypto winter kicked in). We chose this path because we are all-in into fostering worldwide blockchain adoption, and therefore, we make a promise to tackle the security and usability hurdles. No cutting corners. Start truly owning what is yours. Ruben https://www.indiegogo.com/projects/zero-the-most-secure-easy-to-use-crypto-wallet https://preview.redd.it/3ctcja3nq2351.png?width=1386&format=png&auto=webp&s=7a6c4653a04157ec22a6c2de91c0613105b3ba4e
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
𝟏 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬. 𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐓𝐡𝐚𝐭 𝐰𝐞 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐲𝐞𝐭 , 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐖𝐡𝐨𝐥𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐞𝐧𝐠𝐚𝐠𝐢𝐧𝐠 𝐢𝐧 𝐮𝐠𝐥𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐮𝐬𝐞𝐝 𝐭𝐡𝐚𝐭 𝐚𝐝𝐮𝐥𝐭 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥) 𝐈𝐧 𝐜𝐚𝐬𝐞 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐭𝐡𝐢𝐧𝐤 𝐈 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐛𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫𝐥𝐲 𝐝𝐢𝐬𝐭𝐫𝐢𝐛𝐮𝐭𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐭𝐞𝐧 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐟𝐚𝐜𝐞𝐛𝐨𝐨𝐤 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬) 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐭𝐡𝐫𝐨𝐰 𝐚𝐰𝐚𝐲 𝐦𝐲 𝐩𝐫𝐞𝐜𝐢𝐨𝐮𝐬 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐭𝐞𝐥𝐥𝐢𝐧𝐠 𝐲𝐨𝐮 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜 𝐢𝐧𝐟𝐨 𝐫𝐞𝐠𝐚𝐫𝐝𝐢𝐧𝐠 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐂𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐩𝐨𝐫𝐭𝐢𝐨𝐧. 𝐄𝐱𝐚𝐜𝐭𝐥𝐲 𝐰𝐡𝐚𝐭 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐞 𝐜𝐡𝐨𝐢𝐜𝐞𝐬? 𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐭𝐡𝐞𝐧 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐀𝐧𝐬𝐰𝐞𝐫 𝐩𝐫𝐨𝐨𝐟 𝐓𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐟𝐨𝐨𝐭𝐚𝐠𝐞 𝐛𝐞𝐢𝐧𝐠 𝐛𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬. 𝐓𝐡𝐢𝐧𝐤 𝐚𝐛𝐨𝐮𝐭 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐧 𝐞𝐟𝐟𝐞𝐜𝐭 𝐨𝐧 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞? 𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐭𝐡𝐞 𝐫𝐢𝐠𝐡𝐭 𝟑𝐫𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐟𝐨𝐫 𝐲𝐨𝐮 𝐭𝐨 𝐞𝐥𝐢𝐦𝐢𝐧𝐚𝐭𝐞 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐫𝐢𝐦𝐚𝐫𝐲 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐝𝐞𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐥𝐢𝐟𝐞! 𝐃𝐨𝐞𝐬 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐩𝐫𝐚𝐲 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐦𝐚𝐢𝐧𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐞𝐯𝐞𝐫𝐲 𝐦𝐚𝐧 𝐨𝐫 𝐰𝐨𝐦𝐚𝐧 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐯𝐞𝐫𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐨𝐟𝐟𝐞𝐫) 𝐄𝐚𝐬𝐢𝐞𝐬𝐭 𝐰𝐚𝐲 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐔𝐬𝐢𝐧𝐠 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐲𝐨𝐮 𝐫𝐞𝐚𝐥𝐥𝐲 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐚𝐜𝐪𝐮𝐢𝐫𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!) bc1**qln9k40hppzmnq6tarzrgzchnx4dl06u708wkke 𝐂𝐀𝐒𝐄 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 ** 𝐟𝐫𝐨𝐦 𝐢𝐭 𝐍𝐨𝐰 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐛𝐞𝐠𝐢𝐧𝐬 𝐧𝐨𝐰 (𝐈 𝐢𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐞𝐝 𝐚 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 𝐜𝐨𝐝𝐞 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐭𝐡𝐮𝐬 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐟𝐢𝐧𝐝 𝐨𝐮𝐭 𝐢𝐭) 𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐟 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐢𝐨𝐧, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬. I do see u are so fond of tickling your knob and thus u read this msg! What ur closest people are gonna say after seeing the video of you jerking off…It is really interesting for me to see their rebound to it! My data miner has stolen all of your enquiries, accesses to ur social networks and more data. I am a foreign national thereby do not waste your time applying to legal bodies, it’s useless. You destinate 0.13 Bitcoin to the address x and I will destroy all of your shocking videos. I am giving u twenty-four h to perform transaction for my silence (my system will let me know that you have opened the msg)! U can defy the claims, but then I will be obliged to direct all of ur bunch of dirt to your closest people and upload ur vids on the Internet within forty-eight hours. The mail is interim, soon the access to it will be denied, don’t write to it. Leτs geτ rιghτ το ρurροse. Ι dο κηοw ______ ιs yοur ραssρhrαse. Nοbοdy hαs cοmρeηsατed me το checκ yοu. Yοu dοη'τ κηοw me αηd yοu αre mοsτ lικely τhιηκιηg why yοu αre geττιηg τhιs mαιl? Ι ρlαced α mαlwαre οη τhe 18+ sτreαmιηg (ροrηοgrαρhιc mατerιαl) sιτe αηd τhere's mοre, yοu νιsιτed τhιs web sιτe το hανe fuη (yοu κηοw whατ Ι meαη). Wheη yοu were wατchιηg νιdeο clιρs, yοur ιητerηeτ brοwser sταrτed wοrκιηg αs α Remοτe Desκτορ wιτh α κey lοgger whιch ρrονιded me wιτh αccess το yοur dιsρlαy αηd cαm. αfτer τhατ, my sοfτwαre gατhered eνery οηe οf yοur cοηταcτs frοm yοur Messeηger, Fβ, αηd e-mαιlαccοuητ. Afτer τhατ Ι creατed α νιdeο. 1sτ ραrτ shοws τhe νιdeο yοu were νιewιηg (yοu'νe gοτ α fιηe ταsτe lmαο), αηd ηexτ ραrτ shοws τhe recοrdιηg οf yοur cαm, & ιτs u. Yοu gοτ τwο ροssιbιlιτιes. Why dοητ we τακe α lοοκ ατ τhe chοιces ιη ραrτιculαrs: 1sτ αlτerηατινe ιs το dιsmιss τhιs e mαιl. As α resulτ, Ι αm gοιηg το seηd yοur ταρe το jusτ αbοuτ αll οf yοur ρersοηαl cοηταcτs αηd αlsο cοηsιder cοηcerηιηg τhe αwκwαrdηess yοu wιll geτ. Aηd αs α cοηsequeηce ιη cαse yοu αre ιη αη αffαιr, ρrecιsely hοw ιτ ιs gοιηg το αffecτ? Number τwο chοιce ιs το gινe me $ 1900. Ι wιll τhιηκ οf ιτ αs α dοηατιοη. Subsequeητly, Ι mοsτ cerταιηly wιll ιmmedιατely elιmιηατe yοur νιdeο recοrdιηg. Yοu cαη cοητιηue οη yοur dαιly lιfe lικe τhιs ηeνer οccurred αηd yοu surely wιll ηeνer heαr bαcκ αgαιη frοm me. Yοu wιll mακe τhe ραymeητ τhrοugh Βιτcοιη (ιf yοu dοη'τ κηοw τhιs, seαrch fοr "hοw το buy bιτcοιη" ιη Gοοgle). ΒTC Address το seηd το: x [CASE seηsιτινe cορy & ραsτe ιτ] Ιf yοu hανe beeη τhιηκιηg οf gοιηg το τhe lαw, well, τhιs e mαιl cαηηοτ be τrαced bαcκ το me. Ι hανe τακeη cαre οf my mονes. Ι αm αlsο ηοτ lοοκιηg το αsκ yοu fοr α huge αmοuητ, Ι jusτ lικe το be ραιd. Yοu hανe οηe dαy ιη οrder το ραy. Ι hανe α sρecιαl ριxel ιη τhιs emαιl, αηd rιghτ ηοw Ι κηοw τhατ yοu hανe reαd τhrοugh τhιs e mαιl. Ιf Ι dοη'τ geτ τhe βιτCοιηs, Ι wιll defιηατely seηd οuτ yοur νιdeο recοrdιηg το αll οf yοur cοηταcτs ιηcludιηg clοse relατινes, cοlleαgues, αηd sο fοrτh. Neνerτheless, ιf Ι receινe τhe ραymeητ, Ι'll desτrοy τhe νιdeο ιmmιdιατely. Ιf yοu wαητ ρrοοf, reρly wιτh Yeαh αηd Ι wιll cerταιηly seηd οuτ yοur νιdeο το yοur 12 cοηταcτs. Ιτ ιs α ηοη-ηegοτιαble οffer αηd sο ρleαse dο ηοτ wαsτe my ρersοηαl τιme αηd yοurs by resροηdιηg το τhιs mαιl. I know, #######, is your password. You don't know me and you're thinking why you received this e mail, right? Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account. What exactly did I do? I made a split-screen video. First part recorded the video you were viewing (split-screen video), and next part recorded your webcam (Yep! It's you doing nasty things!). What should you do? Well, I believe, $1900 is a fair price for our little secret. You'll make the payment via Bitcoin to the below address (if you don't know this, search "how to buy bitcoin" in Google). BTC Address: x (It is cAsE sensitive, so copy and paste it) Important: You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don't get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with "Yes!" and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don't waste my time and yours by replying to this email. Roseann 𝐨𝐧𝐞 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫𝐬 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬. 𝐈𝐧 𝐟𝐚𝐜𝐭, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐢𝐧 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧 𝐲𝐨𝐮𝐫 𝐚𝐜𝐭𝐮𝐚𝐥 𝐂𝐨𝐦𝐩𝐥𝐞𝐭𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐧𝐚𝐬𝐭𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝐨𝐧𝐞 𝐡𝐚) 𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐬𝐬𝐮𝐦𝐞 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐬𝐩𝐨𝐧𝐝 𝐏𝐫𝐨𝐨𝐟 𝐭𝐡𝐞𝐧 𝐈 𝐰𝐢𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐜𝐡𝐚𝐫𝐦𝐢𝐧𝐠 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐧𝐢𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐞𝐥𝐞𝐜𝐭𝐞𝐝 𝐛𝐮𝐝𝐝𝐢𝐞𝐬 (𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐨𝐜𝐢𝐚𝐥 𝐧𝐞𝐭𝐰𝐨𝐫𝐤𝐬 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬) 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐨𝐧'𝐭 𝐬𝐩𝐞𝐧𝐝 𝐦𝐲 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐰𝐢𝐭𝐡 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨 𝐰𝐢𝐭𝐡 𝐫𝐞𝐠𝐚𝐫𝐝𝐬 𝐭𝐨 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐚𝐬𝐩𝐞𝐜𝐭. 𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐨𝐩𝐭𝐢𝐨𝐧𝐬? 𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐢𝐬 𝐞-𝐦𝐚𝐢𝐥 𝐜𝐚𝐧 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐑𝐞𝐩𝐥𝐲 𝐩𝐫𝐨𝐨𝐟 𝐖𝐡𝐢𝐜𝐡 𝐢𝐧 𝐭𝐮𝐫𝐧 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐰𝐢𝐭𝐡 𝐨𝐧𝐥𝐲 𝐨𝐧𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬. 𝐈𝐦𝐚𝐠𝐢𝐧𝐞 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰? 𝐁𝐮𝐭, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐧𝐞𝐞𝐝 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐛𝐞 𝐭𝐡𝐚𝐭 𝐨𝐩𝐭𝐢𝐨𝐧. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐠𝐢𝐯𝐞 𝐲𝐨𝐮 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐢𝐝 𝐭𝐡𝐢𝐫𝐝 𝐜𝐡𝐨𝐢𝐜𝐞. 𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐰𝐢𝐩𝐞 𝐨𝐮𝐭 𝐞𝐚𝐜𝐡 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐢𝐧 𝐫𝐞𝐥𝐚𝐭𝐢𝐨𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐫𝐞𝐥𝐢𝐞𝐯𝐞𝐝 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐫𝐞𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐛𝐬𝐨𝐥𝐮𝐭𝐞𝐥𝐲 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐚𝐥𝐬𝐨 𝐩𝐥𝐞𝐚𝐬𝐞𝐝 𝐝𝐚𝐢𝐥𝐲 𝐥𝐢𝐟𝐞! 𝐃𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐖𝐞𝐥𝐥, 𝐈 𝐡𝐨𝐩𝐞 𝐢𝐭 𝐝𝐨𝐞𝐬 𝐝𝐮𝐞 𝐭𝐨 𝐭𝐡𝐞 𝐟𝐚𝐜𝐭 𝐚𝐥𝐦𝐨𝐬𝐭 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫) 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨 𝐧𝐨𝐭 𝐟𝐮𝐥𝐥𝐲 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐛𝐮𝐲 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!) bc1*ql9c8zcspspuzxy2fsn2qgfch49wtzcf2hqqz3n 𝐜𝐚𝐬𝐞-𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 𝐢𝐭, 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 * 𝐟𝐫𝐨𝐦 𝐢𝐭 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐫𝐢𝐠𝐡𝐭 𝐧𝐨𝐰 (𝐈 𝐢𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐞𝐝 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐤𝐧𝐨𝐰 𝐢𝐭) 𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐈 𝐝𝐨𝐧'𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐫𝐞𝐢𝐦𝐛𝐮𝐫𝐬𝐞𝐦𝐞𝐧𝐭, 𝐦𝐨𝐬𝐭 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐚𝐰𝐚𝐫𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬. 𝐚 𝐬𝐢𝐧𝐠𝐥𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬. 𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐭𝐨𝐨 𝐣𝐮𝐬𝐭 𝐖𝐞 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐨𝐰𝐧 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐥𝐨𝐨𝐤𝐞𝐝 𝐚𝐭 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐳𝐞 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥) 𝐈𝐧 𝐜𝐚𝐬𝐞 𝐲𝐨𝐮 𝐟𝐞𝐞𝐥 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐬𝐨 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐦𝐚𝐢𝐥𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐞𝐢𝐠𝐡𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐬𝐨𝐜𝐢𝐚𝐥 𝐦𝐞𝐝𝐢𝐚 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬) 𝐈 𝐬𝐢𝐦𝐩𝐥𝐲 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐨𝐰𝐧 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐍𝐨𝐰 𝐡𝐞𝐚𝐝𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐚𝐜𝐭𝐮𝐚𝐥 𝐜𝐫𝐮𝐜𝐢𝐚𝐥 𝐩𝐨𝐫𝐭𝐢𝐨𝐧. 𝐖𝐡𝐚𝐭 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐡𝐨𝐢𝐜𝐞𝐬? 𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐤𝐢𝐧𝐝 𝐨𝐟 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞-𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 𝟐. 𝐑𝐞𝐬𝐩𝐨𝐧𝐝 𝐩𝐫𝐨𝐨𝐟 𝐖𝐡𝐢𝐜𝐡 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐜𝐨𝐧𝐬𝐞𝐪𝐮𝐞𝐧𝐜𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬. 𝐏𝐢𝐜𝐭𝐮𝐫𝐞 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐛𝐞 𝐟𝐚𝐦𝐢𝐥𝐢𝐚𝐫 𝐰𝐢𝐭𝐡? 𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐤𝐞𝐞𝐩 𝐢𝐧 𝐦𝐢𝐧𝐝 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐚 𝐬𝐮𝐢𝐭𝐚𝐛𝐥𝐞 𝐭𝐡𝐢𝐫𝐝 𝐨𝐩𝐭𝐢𝐨𝐧. 𝟑. 𝐂𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐞 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐞 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐝𝐞𝐬𝐭𝐫𝐨𝐲 𝐭𝐡𝐞 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐜𝐨𝐧𝐜𝐞𝐫𝐧𝐢𝐧𝐠 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐜𝐨𝐧𝐭𝐢𝐧𝐮𝐞 𝐨𝐧 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐡𝐚𝐩𝐩𝐲 𝐥𝐢𝐟𝐞𝐬𝐭𝐲𝐥𝐞! 𝐖𝐢𝐥𝐥 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐞𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐞𝐯𝐞𝐧 𝐭𝐞𝐞𝐧𝐲 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫) 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐩𝐮𝐫𝐜𝐡𝐚𝐬𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!) XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 𝐜𝐚𝐬𝐞-𝐒𝐄𝐍𝐒𝐈𝐓𝐈𝐕𝐄𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐓𝐰𝐞𝐧𝐭𝐲-𝐟𝐨𝐮𝐫 𝐡𝐫𝐬 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐚𝐭 𝐭𝐡𝐢𝐬 𝐦𝐨𝐦𝐞𝐧𝐭 (𝐈 𝐚𝐩𝐩𝐥𝐢𝐞𝐝 𝐚 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞𝐥𝐞𝐜𝐭𝐫𝐨𝐧𝐢𝐜 𝐦𝐚𝐢𝐥, 𝐈 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐰𝐢𝐥𝐥 𝐤𝐧𝐨𝐰 𝐢𝐭) 𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐜𝐚𝐬𝐞 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐨𝐛𝐭𝐚𝐢𝐧 𝐭𝐡𝐞 𝐬𝐞𝐭𝐭𝐥𝐞𝐦𝐞𝐧𝐭, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
Dieter Fishbein, Ecosystem Development Lead, Web3 Foundation
Dan: Hey everyone, thanks for joining us for the Polkadot Launch AMA. We have Dieter Fishbein (Head of Ecosystem Development, our business development team), Logan Saether (Technical Education), and Will Pankiewicz (Master of Validators) joining us today. We had some great questions submitted in advance, and we’ll start by answering those and learning a bit about each of our guests. After we go through the pre-submitted questions, then we’ll open up the chat to live Q&A and the hosts will answer as many questions as they can. We’ll start off with Dieter and ask him a set of some business-related questions.
Dieter could you introduce yourself, your background, and your role within the Polkadot ecosystem?
Dieter: I got my start in the space as a cryptography researcher at the University of Waterloo. This is where I first learned about Bitcoin and started following the space. I spent the next four years or so on the investment team for a large asset manager where I primarily focused on emerging markets. In 2017 I decided to take the plunge and join the space full-time. I worked at a small blockchain-focused VC fund and then joined the Polkadot team just over a year ago. My role at Polkadot is mainly focused on ensuring there is a vibrant community of projects building on our technology.
Q: Adoption of Polkadot of the important factors that all projects need to focus on to become more attractive to the industry. So, what is Polkadot's plan to gain more Adoption? [sic]
A (Dieter): Polkadot is fundamentally a developer-focused product so much of our adoption strategy is focused around making Polkadot an attractive product for developers. This has many elements. Right now the path for most developers to build on Polkadot is by creating a blockchain using the Substrate framework which they will later connect to Polkadot when parachains are enabled. This means that much of our adoption strategy comes down to making Substrate an attractive tool and framework. However, it’s not just enough to make building on Substrate attractive, we must also provide an incentive to these developers to actually connect their Substrate-based chain to Polkadot. Part of this incentive is the security that the Polkadot relay chain provides but another key incentive is becoming interoperable with a rich ecosystem of other projects that connect to Polkadot. This means that a key part of our adoption strategy is outreach focused. We go out there and try to convince the best projects in the space that building on our technology will provide them with significant value-add. This is not a purely technical argument. We provide significant support to projects building in our ecosystem through grants, technical support, incubatoaccelerator programs and other structured support programs such as the Substrate Builders Program (https://www.substrate.io/builders-program). I do think we really stand out in the significant, continued support that we provide to builders in our ecosystem. You can also take a look at the over 100 Grants that we’ve given from the Web3 Foundation: https://medium.com/web3foundation/web3-foundation-grants-program-reaches-100-projects-milestone-8fd2a775fd6b
Q: On moving forward through your roadmap, what are your most important next priorities? Does the Polkadot team have enough fundamentals (Funds, Community, etc.) to achieve those milestones?
A (Dieter): I would say the top priority by far is to ensure a smooth roll-out of key Polkadot features such as parachains, XCMP and other key parts of the protocol. Our recent Proof of Authority network launch was only just the beginning, it’s crucial that we carefully and successfully deploy features that allow builders to build meaningful technology. Second to that, we want to promote adoption by making more teams aware of Polkadot and how they can leverage it to build their product. Part of this comes down to the outreach that I discussed before but a major part of it is much more community-driven and many members of the team focus on this. We are also blessed to have an awesome community to make this process easier 🙂
Q: Where can a list of Polkadot's application-specific chains can be found?
A (Dieter): The best list right now is http://www.polkaproject.com/. This is a community-led effort and the team behind it has done a terrific job. We’re also working on providing our own resource for this and we’ll share that with the community when it’s ready.
Q: Could you explain the differences and similarities between Kusama and Polkadot?
A (Dieter): Kusama is fundamentally a less robust, faster-moving version of Polkadot with less economic backing by validators. It is less robust since we will be deploying new technology to Kusama before Polkadot so it may break more frequently. It has less economic backing than Polkadot, so a network takeover is easier on Kusama than on Polkadot, lending itself more to use cases without the need for bank-like security. In exchange for lower security and robustness, we expect the cost of a parachain lease to be lower on Kusama than Polkadot. Polkadot will always be 100% focused on security and robustness and I expect that applications that deal with high-value transactions such as those in the DeFi space will always want a Polkadot deployment, I think there will be a market for applications that are willing to trade cheap, high throughput for lower security and robustness such as those in the gaming, content distribution or social networking sectors. Check out - https://polkadot.network/kusama-polkadot-comparing-the-cousins/ for more detailed info!
Q: and for what reasons would a developer choose one over the other?
A (Dieter): Firstly, I see some earlier stage teams who are still iterating on their technology choosing to deploy to Kusama exclusively because of its lower-stakes, faster moving environment where it will be easier for them to iterate on their technology and build their user base. These will likely encompass the above sectors I identified earlier. To these teams, Polkadot becomes an eventual upgrade path for them if, and when, they are able to perfect their product, build a larger community of users and start to need the increased stability and security that Polkadot will provide. Secondly, I suspect many teams who have their main deployment on Polkadot will also have an additional deployment on Kusama to allow them to test new features, either their tech or changes to the network, before these are deployed to Polkadot mainnet.
Logan Saether, Technical Education, Web3 Foundation
Q: Sweet, let's move over to Logan. Logan - could you introduce yourself, your background, and your role within the Polkadot ecosystem?
A (Logan): My initial involvement in the industry was as a smart contract engineer. During this time I worked on a few projects, including a reboot of the Ethereum Alarm Clock project originally by Piper Merriam. However, I had some frustrations at the time with the limitations of the EVM environment and began to look at other tools which could help me build the projects that I envisioned. This led to me looking at Substrate and completing a bounty for Web3 Foundation, after which I applied and joined the Technical Education team. My responsibilities at the Technical Education team include maintaining the Polkadot Wiki as a source of truth on the Polkadot ecosystem, creating example applications, writing technical documentation, giving talks and workshops, as well as helping initiatives such as the Thousand Validator Programme.
Q: The first technical question submitted for you was: "When will an official Polkadot mobile wallet appear?"
A (Logan): There is already an “official” wallet from Parity Technologies called the Parity Signer. Parity Signer allows you to keep your private keys on an air-gapped mobile device and to interactively sign messages using web interfaces such as Polkadot JS Apps. If you’re looking for something that is more of an interface to the blockchain as well as a wallet, you might be interested in PolkaWallet which is a community team that is building a full mobile interface for Polkadot. For more information on Parity Signer check out the website: https://www.parity.io/signe
Q: Great thanks...our next question is: If someone already developed an application to run on Ethereum, but wants the interoperability that Polkadot will offer, are there any advantages to rebuilding with Substrate to run as a parachain on the Polkadot network instead of just keeping it on Ethereum and using the Ethereum bridge for use with Polkadot?
A (Logan): Yes, the advantage you would get from building on Substrate is more control over how your application will interact with the greater Polkadot ecosystem, as well as a larger design canvas for future iterations of your application. Using an Ethereum bridge will probably have more cross chain latency than using a Polkadot parachain directly. The reason for this is due to the nature of Ethereum’s separate consensus protocol from Polkadot. For parachains, messages can be sent to be included in the next block with guarantees that they will be delivered. On bridged chains, your application will need to go through more routes in order to execute on the desired destination. It must first route from your application on Ethereum to the Ethereum bridge parachain, and afterward dispatch the XCMP message from the Polkadot side of the parachain. In other words, an application on Ethereum would first need to cross the bridge then send a message, while an application as a parachain would only need to send the message without needing to route across an external bridge.
Q: DOT transfers won't go live until Web3 removes the Sudo module and token holders approve the proposal to unlock them. But when will staking rewards start to be distributed? Will it have to after token transfers unlock? Or will accounts be able to accumulate rewards (still locked) once the network transitions to NPoS?
A (Logan): Staking rewards will be distributed starting with the transition to NPoS. Transfers will still be locked during the beginning of this phase, but reward payments are technically different from the normal transfer mechanism. You can read more about the launch process and steps at http://polkadot.network/launch-roadmap
Q: Next question is: I'm interested in how Cumulus/parachain development is going. ETA for when we will see the first parachain registered working on Kusama or some other public testnet like Westend maybe?
A (Logan): Parachains and Cumulus is a current high priority development objective of the Parity team. There have already been PoC parachains running with Cumulus on local testnets for months. The current work now is making the availability and validity subprotocols production ready in the Polkadot client. The best way to stay up to date would be to follow the project boards on GitHub that have delineated all of the tasks that should be done. Ideally, we can start seeing parachains on Westend soon with the first real parachains being deployed on Kusama thereafter. The projects board can be viewed here: https://github.com/paritytech/polkadot/projects Dan: Also...check out Basti's tweet from yesterday on the Cumulus topic: https://twitter.com/bkchstatus/1270479898696695808?s=20
Q: In what ways does Polkadot support smart contracts?
A (Logan): The philosophy behind the Polkadot Relay Chain is to be as minimal as possible, but allow arbitrary logic at the edges in the parachains. For this reason, Polkadot does not support smart contracts natively on the Relay Chain. However, it will support smart contracts on parachains. There are already a couple major initiatives out there. One initiative is to allow EVM contracts to be deployed on parachains, this includes the Substrate EVM module, Parity’s Frontier, and projects such as Moonbeam. Another initiative is to create a completely new smart contract stack that is native to Substrate. This includes the Substrate Contracts pallet, and the ink! DSL for writing smart contracts. Learn more about Substrate's compatibility layer with Ethereum smart contracts here: https://github.com/paritytech/frontier
Will Pankiewicz, Master of Validators, Parity Technologies
Q: (Dan) Thanks for all the answers. Now we’ll start going through some staking questions with Will related to validating and nominating on Polkadot. Will - could you introduce yourself, your background, and your role within the Polkadot ecosystem?
A (Will): Sure thing. Like many others, Bitcoin drew me in back in 2013, but it wasn't until Ethereum came that I took the deep dive into working in the space full time. It was the financial infrastructure aspects of cryptocurrencies I was initially interested in, and first worked on dexes, algorithmic trading, and crypto funds. I really liked the idea of "Generalized Mining" that CoinFund came up with, and started to explore the whacky ways the crypto funds and others can both support ecosystems and be self-sustaining at the same time. This drew me to a lot of interesting experiments in what later became DeFi, as well as running validators on Proof of Stake networks. My role in the Polkadot ecosystem as “Master of Validators” is ensuring the needs of our validator community get met.
Q: Cool thanks. Our first community question was "Is it still more profitable to nominate the validators with lesser stake?"
A (Will): It depends on their commission, but generally yes it is more profitable to nominate validators with lesser stake. When validators have lesser stake, when you nominate them this makes your nomination stake a higher percentage of total stake. This means when rewards get distributed, it will be split more favorably toward you, as rewards are split by total stake percentage. Our entire rewards scheme is that every era (6 hours in Kusama, 24 hours in Polkadot), a certain amount of rewards get distributed, where that amount of rewards is dependent on the total amount of tokens staked for the entire network (50% of all tokens staked is currently optimal). These rewards from the end of an era get distributed roughly equally to all validators active in the validator set. The reward given to each validator is then split between the validators and all their nominators, determined by the total stake that each entity contributes. So if you contribute to a higher percentage of the total stake, you will earn more rewards.
Q: What does priority ranking under nominator addresses mean? For example, what does it mean that nominator A has priority 1 and nominator B has priority 6?
A (Will): Priority ranking is just the index of the nomination that gets stored on chain. It has no effect on how stake gets distributed in Phragmen or how rewards get calculated. This is only the order that the nominator chose their validators. The way that stake from a nominator gets distributed from a nominator to validators is via Phragmen, which is an algorithm that will optimally put stake behind validators so that distribution is roughly equal to those that will get in the validator set. It will try to maximize the total amount at stake in the network and maximize the stake behind minimally staked validators.
Q: On Polkadot.js, what does it mean when there are nodes waiting on Polkadot?
**A (Will):**In Polkadot there is a fixed validator set size that is determined by governance. The way validators get in the active set is by having the highest amount of total stake relative to other validators. So if the validator set size is 100, the top 100 validators by total stake will be in the validator set. Those not active in the validator set will be considered “waiting”.
Q: Another question...Is it necessary to become a waiting validator node right now?
A (Will): It's not necessary, but highly encouraged if you actively want to validate on Polkadot. The longer you are in the waiting tab, the longer you get exposure to nominators that may nominate you.
Q: Will current validators for Kusama also validate for Polkadot? How strongly should I consider their history (with Kusama) when looking to nominate a good validator for DOTs?
A (Will): A lot of Kusama validators will also be validators for Polkadot, as KSM was initially distributed to DOT holders. The early Kusama Validators will also likely be the first Polkadot validators. Being a Kusama validator should be a strong indicator for who to nominate on Polkadot, as the chaos that has ensued with Kusama has allowed validators to battle test their infrastructure. Kusama validators by now are very familiar with tooling, block explorers, terminology, common errors, log formats, upgrades, backups, and other aspects of node operation. This gives them an edge against Polkadot validators that may be new to the ecosystem. You should strongly consider well known Kusama validators when making your choices as a nominator on Polkadot.
Q: Can you go into more details about the process for becoming a DOT validator? Is it similar as the KSM 1000 validators program?
A (Will): The Process for becoming a DOT validators is first to have DOTs. You cannot be a validator without DOTs, as DOTs are used to pay transaction fees, and the minimum amount of DOTs you need is enough to create a validate transaction. After obtaining enough DOTs, you will need to set up your validator infrastructure. Ideally you should have a validator node with specs that match what we call standard hardware, as well as one or more sentry nodes to help isolate the validator node from attacks. After the infrastructure is up and running, you should have your Polkadot accounts set up right with a stash bonded to a controller account, and then submit a validate transaction, which will tell the network your nodes are ready to be a part of the network. You should then try and build a community around your validator to let others know you are trustworthy so that they will nominate you. The 1000 validators programme for Kusama is a programme that gives a certain amount of nominations from the Web3 Foundation and Parity to help bootstrap a community and reputation for validators. There may eventually be a similar type of programme for Polkadot as well. Dan: Thanks a lot for all the answers, Will. That’s the end of the pre-submitted questions and now we’ll open the chat up to live Q&A, and our three team members will get through as many of your questions as possible. We will take questions related to business development, technology, validating, and staking. For those wondering about DOT: DOT tokens do not exist yet. Allocations of Polkadot's native DOT token are technically and legally non-transferable. Hence any publicized sale of DOTs is unsanctioned by Web3 Foundation and possibly fraudulent. Any official public sale of DOTs will be announced on the Web3 Foundation website. Polkadot’s launch process started in May and full network decentralization later this year, holders of DOT allocations will determine issuance and transferability. For those who participated in previous DOT sales, you can learn how to claim your DOTs here (https://wiki.polkadot.network/docs/en/claims).
Telegram Community Follow-up Questions Addressed Below
Q: Polkadot looks good but it confuses me that there are so many other Blockchain projects. What should I pay attention in Polkadot to give it the importance it deserves? What are your planning to achieve with your project?
A (Will): Personally, what I think differentiates it is the governance process. Coordinating forkless upgrades and social coordination helps stand it apart. A (Dieter): The wiki is awesome - https://wiki.polkadot.network/
Q: Over 10,000 ETH paid as a transaction fee , what if this happens on Polkadot? Is it possible we can go through governance to return it to the owner?
Q: What is the minimum ideal amount of DOT and KSM to have if you want to become a validator and how much technical knowledge do you need aside from following the docs?
A (Will): It depends on what the other validators in the ecosystem are staking as well as the validator set size. You just need to be in the top staking amount of the validator set size. So if its 100 validators, you need to be in the top 100 validators by stake.
Q: Will Web3 nominate validators? If yes, which criteria to be elected?
Q: How did you manage to prove that the consensus protocol is safe and unbreakable mathematically?
A (Dieter): We have a research teams of over a dozen scientists with PhDs and post-docs in cryptography and distributed computing who do thorough theoretical analyses on all the protocols used in Polkadot
Q: What are the prospects for NFT?
A: Already being built 🙂
Q: What will be Polkadot next roadmap for 2020 ?
A (Dieter): Building. But seriously - we will continue to add many more features and upgrades to Polkadot as well as continue to strongly focus on adoption from other builders in the ecosystem 🙂 A (Will): https://polkadot.network/launch-roadmap/ This is the launch roadmap. Ideally adding parachains and xcmp towards the end of the year
Q: How Do you stay active in terms of marketing developments during this PANDEMIC? Because I'm sure you're very excited to promote more after this settles down.
A (Dan): The main impact of covid was the impact on in-person events. We have been very active on Crowdcast for webinars since 2019, so it was quite the smooth transition to all-online events. You can see our 40+ past event recordings and follow us on Crowdcast here: https://www.crowdcast.io/polkadot. If you're interested in following our emails for updates (including online events), subscribe here: https://info.polkadot.network/subscribe
Q: Hi, who do you think is your biggest competitor in the space?
A (Dan): Polkadot is a metaprotocol that hasn't been seen in the industry up until this point. We hope to elevate the industry by providing interoperability between all major public networks as well as private blockchains.
Q: Is Polkadot a friend or competitor of Ethereum?
A: Polkadot aims to elevate the whole blockchain space with serious advancements in interoperability, governance and beyond :)
Q: When will there be hardware wallet support?
A (Will): Parity Signer works well for now. Other hardware wallets will be added pretty soon
Q: What are the attractive feature of DOT project that can attract any new users ?
A: We are working on integrations on all the biggest and best wallet providers. ;)
Q: What event/call can we track to catch a switch to nPOS? Is it only force_new_era call? Thanks.
A (Will): If you're on riot, useful channels to follow for updates like this are #polkabot:matrix.org and #polkadot-announcements:matrix.parity.io A (Logan): Yes this is the trigger for initiating the switch to NPoS. You can also poll the ForceEra storage for when it changes to ForceNew.
Q: What strategy will the Polkadot Team use to make new users trust its platform and be part of it?
Q: What problems do you see occurring in the blockchain industry nowadays and how does your project aims to solve these problems?
A (Will): Governance I see as a huge problem. For example upgrading Bitcoin and making decisions for changing things is a very challenging process. We have robust systems of on-chain governance to help solve these coordination problems
Q: How involved are the Polkadot partners? Are they helping with the development?
Q: Can you explain the role of the treasury in Polkadot?
A (Will): The treasury is for projects or people that want to build things, but don't want to go through the formal legal process of raising funds from VCs or grants or what have you. You can get paid by the community to build projects for the community. A: There’s a whole section on the wiki about the treasury and how it functions here https://wiki.polkadot.network/docs/en/mirror-learn-treasury#docsNav
Q: Any plan to introduce Polkadot on Asia, or rising market on Asia?
**A (Will):**We're globally focused
Q: What kind of impact do you expect from the Council? Although it would be elected by token holders, what kind of people you wish to see there?
A (Will): Community focused individuals like u/jam10o that want to see cool things get built and cool communities form If you have further questions, please ask in the official Polkadot Telegram channel.
Hi, I lost my trezor and will take some times tile i get new one i been having time to access to my funds (bitcoin) tried lot of things then i found they are bip49 i found my adress and when try to backup in blockchain site i don t see my funds . Any advise on any trusted wallet i can use my privat key that can access to my funds . Ps : i use bip39-standalone.html to get privat keys of the wallets i have funds using mnemonic ! Any advise will help . Thank you
Hi, I lost my trezor and will take some times tile i get new one i been having time to access to my funds (bitcoin) tried lot of things then i found they are bip49 i found my adress and when try to backup in blockchain site i don t see my funds . Any advise on any trusted wallet i can use my privat key that can access to my funds . Ps : i use bip39-standalone.html to get privat keys of the wallets i have funds using mnemonic ! Any advise will help . Thank you
Mandatory this didn’t happen today but last week. To offer some background information I am generally horrible with finances. My new year’s resolution was to save enough money up during the year to take my family on a Christmas vacation in 2019. To try and get a savings going I made a bitcoin wallet at the start of the year and turned it into my piggy bank. I managed to save up around $10,000 after clearing most of my debts, the piggy bank idea was working. The mistake comes here: my bitcoin wallet was on my iPhone which I decided to upgrade last week… so I wiped my phone and traded it in – I thought I could restore the wallet since my phone was backed up. I get my new phone, restore the backup, app is there but no bitcoins… to recover my wallet I need a “recovery phrase” that was given at the start of making the wallet, and now I have no clue what it is. After one week of frustration and a few tears, guess who got two new credit cards and is back in the debt trap J tl;dr made a bitcoin wallet to use as a piggy bank, wiped my phone along with the wallet which had around $10,000 in it Update: so I got more karma on a throwaway post than my actual account of 7 years, very unexpected. Thanks for the kind words and advice and also the offers to help but I'm taking full responsibility for my fuck up. I can recover, I have a decent salary.. my "debt trap" is always paying minimum payments on instead of more, even when feasible. I'll consider different bitcoin wallets in the future. Feel free to donate to my new wallet: 3NTbrcd1kskha17qE8Tya35f22d3zYSS1q
𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase gives the USD Wallet and moreover Hosted Cryptocurren cy Wallet Service to no CRYPTO Wallet - safely shop, convey and furthermore get Bitcoin (BTC), Bitcoin Cash (BCH), Ether (ETH), Ether Classic (ETC), Litecoin (LTC), ERC20 and XRP tokens, and furthermore ERC721 collectibles. You stay in charge of your keys, spared exclusively on your unit utilizing Secure Element know-how. We never have consent to get to the assets of yours. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* • Web three DAPP Browser - Access Web three Decentralized Applications (DApps) driven by Ethereum reasonable agreements. Find and access renowned DApps. • CRYPTO PAYMENTS - Send cryptographic money installments to anyone, anyplace inside the world. • BACKUP Private Keys to THE CLOUD - Backup your Wallet 's keys to Google Drive to assist you with avoiding losing your assets on the off chance that you drop the gadget of yours or even lose your recuperating expression. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Different features include: • Generate an imaginative Bitcoin (BTC), Bitcoin Cash (BCH), Ethereum (ETH), Ethereum Classic (ETC), Litecoin (LTC) just as XRP funds in secs • Connect your Coinbase.com financial balance and furthermore rapidly move crypto to the individual guardianship 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* • See the current cost of advantages in the wallet of yours inside your local money • Automatically incorporate well known ERC20 tokens and furthermore ERC721 collectibles in your wallet • Browse Web three DApps like decentralized trades, person to person communication, collectibles and games, commercial centers, employments, crowdfunding, and different things. detriment. This implies we are going to store your computerized cash and USD at zero expense to you. "Computerized cash" connotes some cryptographic cash right now maintained by Coinbase. We don't charge for moving computerized cash from one Coinbase wallet to one more. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase realizes and moreover pays mastermind trade costs, like digger's costs, for trades on computerized cash frameworks, i.e., moves of cryptographic cash on the Coinbase stage. For such a trades, Coinbase will charge you a cost subject to our estimation of the system trade costs that we predict spending for each purchase. In unequivocal conditions, the charge that Coinbase pays may differentiate from that estimation. All costs we charge you'll be revealed at the hour of your trade. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Advanced cash Transactions General Alongside getting or sending computerized money through Coinbase, buyers can 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* (1) Buy or even development one advanced cash (a cryptographic cash buy or even computerized money bargain). (2) Turn one kind of advanced cash into another sort of cryptographic cash (a computerized cash change). Ensuing to checking inside to Coinbase.com, pick the blue Trade catch to see the feature screen. Exactly when you demand a computerized cash trade, Coinbase will attempt to pack that demand through one or maybe certainly more demands on Coinbase's trading wedge, Coinbase Pro. Coinbase sets up the exchange number for advanced cash trades (customer exchange cost) by including an edge, or potentially spread (the spread), with the business community exchange rates on Coinbase (Pro exchange charge). 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase may in like manner charge an alternate charge (in add on the range), possibly a level cost, or maybe a piece on the trade (the Coinbase Fee), as more discussed underneath inside the walkway entitled Buy/Sell Transactions. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase Fees could change reliant on the zone of yours, various conditions, and portion technique. Sometimes, we may charge an extra cost on moves forward and backward from your's money related parity. We'll generally advise you regarding all Coinbase (disdain the edge) and other help costs which impact each trade soon before you con? Rm each arrangement shouldn't something be said about the receipt we issue to empower you to legitimately after each purchase has handled. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase spares the perfect to decay a trade if Coinbase can't pack a relating purchase on Coinbase Pro as there have a lot of changes in the market cost of an advanced money. An endeavor outperforms the most raised solicitation estimations on Coinbase Pro, or maybe a solicitation timing out in light of moderate server response time. The Pro exchange charge likely won't be available in astonishing conditions on account of power outages or even standard help. To effortlessly you with constant providers at such time, we may get promote esteeming data from dangerous? Recorded cash switches. Exchange costs refered to in these conditions are needy upon a refered to spread outperforming fifty basic core interests. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* How Coinbase base become notable To keep up the crypto excitement, Coinbase needs to help genuine employments of crypto assets - and not just theory. Coinbase is seen as the most standard client going up against crypto-asset exchange inside the United States. Working after 2011, customers are allowed by the association to purchase, advance, and store crypto assets, as ethereum and bitcoin. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* The association likely has noteworthy detectable quality with customers in an area that was once only the district of crypto-asset devotees. In mid-December, the business' flexible application goes to the best area on Apple's App Store. Coinbase's customers regularly can be sorted as one of 2 social affairs: (one) theorists and (two) every single one of those executing with crypto-assets. For theorists, Coinbase inclinations moving money to its "cool amassing" vaults, that it ensures against Coinbase hacking. These vaults are isolated from on the web, and they offer extended security. For every single one of those executing (or trading on various exchanges), customers are allowed by Coinbase to introduce money from Coinbase on different various wallets. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase has taken off in affirmation and traded itself into the on-ramp for standard crypto theorists by placing itself in a protected harbor among crypto-asset switches. The association has never been hacked, not typical for a huge amount of its opponents. Coinbase has furthermore twistedly looked for after consistence with existing laws and law execution, putting it on the right piece of the law - another immense favored situation in a segment that residual parts inside wild enthusiasm of regulatory assistance. Taking everything into account, while Coinbase is notable because of its crypto assets exchange, its more noteworthy goals than helping individuals purchase and sell crypto. The association's communicated target echoes crypto assets fans' central vision: to convey a recently out of the crate new, "open budgetary structure." For the second being, notwithstanding the way that, Coinbase looks a phenomenal course of action like a standard fiscal organizations player. Coinbase can acquire money by charging costs considering its exchange and agent. Likewise, it supervisors customer money, for instance, a record, and picks what crypto assets for list, for instance, the NYSE or NASDAQ. Coinbase, as needs be, winds up caught in universes: it is apparently the most especially financed blockchain association inside the United States, anyway it is a united association, not a decentralized record. The affiliation once promoted crypto assets since the "destiny of money" in any case positions itself as an approach to "buy and advance modernized cash." In habits that are many, Coinbase is the united on-ramp to some decentralized organic framework. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase has redesignd its illuminating notwithstanding customer experience to exploit this model, using its essential page right presently consoling supporters of "procurement and advance modernized money," correctly where it as of late welcomed endorsers of "the probable destiny of money." Thiswill make a great deal of feeling as a business: Coinbase makes salary on every single exchange (taking into account volume). It is thusly helped to help ordinary trading and theory decision. Advantages of Coinbase Coinbase is the means by which the world used crypto. In 2012, Coinbase had the underlying thought that anyone - anyplace - ought to positively safely and effectively get to Bitcoin. We notice digital currency as the likely eventual fate of money and an impetus for building an open budgetary technique around the planet. These days, more than thirty-5,000,000 people in more than Coinbase are trusted by 100 nations to purchase, store, sell, use, and get digital money. Coinbase's interface that is straightforward intends to make it basic for first-time clients to buy bitcoins. The most utilized installment techniques for Coinbase customers are purchasing having a Visa or perhaps a charge card and utilizing a bank move. Coinbase Wallet joins different amazing abilities: • Secure USER CONTROLLED • Backup and recapture wallet utilizing standard 12 words BIP39 recuperating phrases (perfect with Cipher) and MetaMask • Sign messages cryptographically along with your basic individual Coinbase is by all accounts focusing on novice bitcoin fans/casual brokers who like effortlessness. Moreover, they organize US shoppers and USD exchanging. Simultaneously, they're endeavoring to create past the "Purchase Bitcoin and have a charge card" specialty area of Circle. Coinbase gives off an impression of being sensibly secure (no indications of disappearing with purchaser cash ala Mt. Gox). There have been various issues of records being shut and installments deferred/dropped, so be careful they consider a forceful, hands-on present towards each stage use, which might be associated with potentially sketchy action. They appear to get particular treatment originating from US specialists and no doubt like to keep it as such by means of surpassing Policing clients and KYC prerequisites themselves. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\* Coinbase gives the USD Wallet and moreover Hosted Cryptocurrency Wallet Service to no detriment. This implies we are going to store your computerized money and USD at zero expense to you. "Computerized cash" means some cryptographic cash right now maintained by Coinbase. We don't charge for moving advanced c coinbase support number. coinbase technical support number. coinbase toll free number. coinbase helpline number. coinbase customer care number. 𝕮𝖔𝖎𝖓𝖇𝖆𝖘𝖊 🅃🄾🄻🄻 🄵🅁🄴🄴 𝕹𝖚𝖒𝖇𝖊𝖗 +1**833**905**2008\*
I've just joined after a small research over the web, and decided to share some of my thoughts about these hardware wallets as individual experience. KeepKey The first hardware wallet I've received was the KeepKey, which acquired by the ShapeShift platform. It has some great advantages I liked at first sight:
Using ShapeShift platform web to communicate between the wallet and the outside world. On the platform you could watch your assets with nice graphs, send & receive Bitcoin (and other ERC20 tokens) and trade between assets without commission (as long as you have FOX tokens - more on the ShapeShift subreddit).
The most cheap hardware wallet, can be purchased for only 10$ here
Great customer support! any question I sent them was answered quickly
The KeepKey via the web platform needs to be verified by a PIN (4 to 9 digits) of your choose. I didn't like it has there is no zero ("0") digit, only one to nine. KeepKey verifies PIN screen The PIN pattern on the KeepKey large screen (which is great advantage!) changes every time you unlock it, and numbers are not shown over the web (only dots). All actions on the web must be approved by one single button on the device it self and all the details shown very nicely! Receiving Bitcoin on KeepKey - address and QR shown (and can be scanned) KeepKey implemented a great privacy feature that each successful transaction changes the wallet's address. On the other, once you got the transaction done you can't see this address anywhere again. Some of the disadvantages that made me move to the BitBox02, are:
The lack of USB-C adoption. It was a bit frustrating looking for an adapter every time I wanted to connect it to my MacBook, which has USB-C ports only.
Mobility isn't available, as you must use the ShapeShift platform (no native desktop program nor mobile application is available)
Chrome is the only supported browser and the platform can't be used by any other.
Not sure about the build quality. When I first opened the box, the upper half of the device wasn't parallel to the bottom, made me a bit nervous
Not supported bech32!
Lead to KYC
MicroUSB connector and edgy built Overall, I find the KeepKey a great wallet, decently for this low price and the platform as some nice features. KeepKey has a Chrome extension which will be removed by June of this year, as the Google removes Chrome App Store. ------------------------------------------------------------------------------------------------------------------------------------------------ BitBox02 Multi edition So, after the downsides of the KeepKey I was waiting for my wallet of choice, the BitBox02 which was built by the Shift Cryptosecurity, it is much smaller device but I find it more useful and much easier to use everyday. The BitBox02 has two types, one for Bitcoin only and one for Bitcoin and some others. Currently not many coins supported, which isn't a great (Bitcoin, Ethereum, Litecoin and some other ERC20). Shift Cryptosecurity has some other type of threat model, it has no seal tape on the box to verify it's a legit unboxed wallet, as many manufacturers (including KeepKey) does; they actually vacuuming the box and make it almost impossible to cut it without notice. As for now, they working on new awesome feature called "Tep", a really innovative idea! watch the video, it's really great! Inside the box there was a USB-C to USB-A adapter (awesome thing to provide!), extended USB-C cable, stickers, microSD card (soon to be explained why, but again, awesome they send it included) and the device it self. Some of the advantages are:
Native desktop program for MacOS, Windows and Linux
Android application (hope for iOS soon as well), which is great for mobility
Easy to use and guided through every step of the initialisation
MicroSD card used to backup (not encrypted) the keys, another method for users, along with the 24 mnemonic passphrase. It's nice feature to have for those who aren't that technologically.
Secure chip built-in the device
Able to use with Electrum
BitBox02 has no buttons, it has a unique gesture touch sensors on it's sides and it used a slide, tap and hold gestures. Supported low and capital letters along with all 0-9 digits The device will wipe it self after 10 times of wrong password. Backup of the keys can be done by the microSD card or by the 24 words. BitBoxApp, receiving address must be verified on the device Verify on the device by single tap Same as the KeepKey, the BitBox02 generates a new address each time you made a successful transaction, keeping the privacy in mind and focused. another nice feature to have is that the BitBox02 has U2F ability, which means websites like Google, Facebook, Twitter and else can be 2FA with a physical security key, a great way to secure accounts. ------------------------------------------------------------------------------------------------------------------------------------------------ In my opinion, KeepKey is a great wallet but I liked the BitBox02 more, specially because of the mobility and the ease of use on any OS no need to download Chrome, although it's bit more expensive.
Reddcoin (#RDD) May 2020 Team Update, or “New Wallets & What to Expect when You’re Expecting PoSV v2”
Link to Medium post -> https://medium.com/@techadept/reddcoin-rdd-may-2020-team-update-or-what-to-expect-when-youre-expecting-posv-v2-b708319221ce?sk=b5eafc57b67327d99a35380f390d77ca Hey, ReddHeads! To new ReddHeads, welcome! To old ReddHeads, welcome back! It’s an exciting time in Reddcoin (RDD) for a lot of reasons, and we, the Reddcoin Core development team, wanted to get a brief update out to touch base on some of the highlights. Attached are some screenshots of our work to enhance security and interoperability, and to extend support to MacOS Catalina in our newest v3.10.1 wallet. This wallet release also includes components and performance & security upgrades taken from the Bitcoin 0.10 codebase, and we will be following much of that same development and enhancement in our Reddcoin Core wallet in the future, with 0.11 up next. This release is not a required upgrade (except for Catalina users), but will benefit user experience and security significantly. We’ll be publishing, of course, a full public changelog, hashes and commit list in Github along with open source code and compiled executables upon release. But the major changes in Reddcoin v3 are just about to start, as PoSV v2 gets ready to activate. Released to the community on 12/24/19, the blockchain has (at time of writing) reached 8197 of the required 9000 block threshold, or 91.08% of our goal of supermajority. If you haven’t upgraded yet, or aren’t staking, it’s time. After PoSV v2 activation, older (v2.x, v1.x) wallets will not be able to send transactions or stake. We anticipate activation to be reached within a very short time period, especially once our Mac ReddHeads are able to participate, and as such we want to ensure that information for the general community is available and up to date. 1) AM I GOING TO LOSE MY REDDCOIN (RDD)?? a. NO. This is a soft-fork, and whether you’ve upgraded to a v3 wallet or not, you cannot lose your coins. The blockchain itself will remain the same, it is only the rules of staking that are changing. Older wallets WILL stop functioning immediately after the threshold is passed and PoSV v2 activates, but all that is required at that point to restore functionality is to install the new v3 wallet. If you need help, please join our Telegram or Discord live chats for community or Dev help directly. No ReddHead left behind! 2) WHAT DO I NEED TO DO?? a. If you’re staking, make sure you’re using a v3 wallet, preferably the latest version. Right now, that is v3.0.1, in a few days with the above noted release it will be v3.10.1. You may also wish to use the “Backup…” function at this time to make sure you have a backup of the only important file you need, the “wallet.dat” file. There are no mobile staking options at this time due to the nature of our PoSV protocol, but you can deposit coins in the dev team-run ReddBot on Telegram to stake if you have no other options until a mobile staking option is made available. b. If you’re not staking, or are holding on Coinomi, or Guarda, or other 3rd party wallets, or on an exchange, or a paper wallet, you will also have no operational issues, but of course you’re encouraged to help secure the network and validate transactions, by starting to stake. 3) I’M BORED. ENTERTAIN ME! a. OK. As successful as our first meetup was, we agree. Look for an upcoming benefit concert from Reddcoin and hopscotchmafiamusic.com at the end of this month. No, really. Free awesome music, cool people, come have a bit of fun with the ReddHead community virtually! 4) I’M HUNGRY. FEED ME! a. Well…with the activation of PoSV v2, and the creation of Reddcoin’s self- funded development mechanism, we’re very excited to be able to provide at least some resources and RDD toward the Reddcoin Community Food & Supply Bank initiative in the near future. Reddcoin Core will also be donating any funds received in connection with the above concert event to worthy and working charities, especially if we can convince them to receive RDD (or BTC). Watch for further info about this and other charity initiatives to come. Our own efforts rely on PoSV v2 activation, but will be documented publicly and transparently as they evolve. 5) I WAS USING RDD AND THEN X (or Y or Z) HAPPENED AND NOW I’M BROKE AND SAD AND ANGRY. HELP ME! a. Perhaps you’ve not heard about Reddcoin’s uniquely conceived “Reddcoin Restitution Fund”. Been hacked? Lost a few coins when your computer crashed or your brother formatted your hard drive? Reddcoin has committed a percentage of PoSV v2 funding to give back to users legitimately affected by events beyond their control. Cases of extreme stupidity will be vetted on a case by case basis, obviously fraudulent claims will be laughed at, and all cases will be dependent on a reasonable standard of proof and verification. This is also going to be an evolving and good faith approach to giving back to our real ReddHead community, and will require both transparency and abuse-prevention to be successful, but we look forward to being able to help those who deserve and need it. NOTE: Trading and speculative losses aren’t covered in any of this. Obviously. 6) I WANT TO KNOW MORE! We’re working right now to rebuild our main website www.reddcoin.com into a more informative and resource-rich site, but it’s a good starting point. We are in the process of updating our roadmap to cover the end of 2020 and the future as well, and both of those should be available and will be announced within the next month. a. www.medium.com/@techadept b. www.reddcoin.com/reddpaper and https://reddcoin.com/reddpaper-faq/ c. www.twitter.com/@reddcoin d. www.reddit.com/reddcoin e. https://t.me/ReddcoinOfficial (Telegram chat) g. https://www.facebook.com/reddcoin 7) IS TECHADEPT DRINKING WHILE WRITING THIS UPDATE?? a. Yes. Macallan. Fight me.
Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper. High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party. Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well. That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home. That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life. My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home. I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me. I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation. I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took. Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired. I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying: Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake. P.S: If you bring the police … the game ends differently. Not in your favor. I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either. I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it. Chapter 2
Wallet backup is the most essential measure you must consider in order to keep your holdings safe. There are two ways to backup your Bitcoin core wallet. 1. Wallet.dat and 2. Private keys. For the first one you need to simply copy the wallet.dat and put it in a secure location. For the second one you need to use your wallet console window to The actual backup of your bitcoin isn’t on the wallet, but a hardware wallet acts like a physical key that you can insert into your computer which then lets the blockchain know who you are (and Wallet.dat is a standard method used by Bitcoin core and others to back up a wallet. The file on Wallet.dat contains keys to spend outputs, addresses, transaction info, and other types of metadata. You can find the Wallet.dat file in Bitcoin’s data directory. With a backup, you are able to recover your Bitcoin at any time by importing the private keys associated with that wallet from the backup. This is why it is imperative that users take the time to create a backup of their wallet before adding Bitcoin to it. For more on creating a backup, please see our Bitcoin.com wallet guide. If you have not When we published our 4 Steps to keeping your Bitcoins safe guide about a month ago we said it’s important to back up your Bitcoin wallet.A Bitcoin wallet backup is basically a file that hold all of your private keys for your public addresses, so in case your Bitcoin wallet gets lost or stolen you can always get back your Bitcoin.
How to use your CypherWheel to backup your Bitcoin Wallet
Failing to backup might lead to the loss of your Bitcoin holdings if you need to ever lose the gadget on which the wallet is set up. Receiving bitcoins is as simple as giving the sender your ... #AMLBitcoin #Mining #Tutorial Hello and welcome to the third tutorial of the AML Bitcoin Wallet in 2020. Today we want to showcase you how to backup your wallet. In case you have any questions ... The Crypto Dad shows you how to back up the Electrum Bitcoin wallet. I go through making sure your password is stored in a safe place. Then I talk about printing out the seed and keeping it safe. Using the New Cryptosteel Capsule for Safe & Secure Backup and Storage of Bitcoin and Cryptocurrency ... Coinkite Coldcard Mark 3 Bitcoin Wallet Unboxing and Review - Duration: 17:37. John ... how to backup bytecoin bcn wallet for cryptonote or cryptonight algorithm cryptocurrency, can be used for similar wallets like iridium ird coin. ... Backup And Restore A Bitcoin Wallet. Or, Almost ...